{"id":52052,"date":"2024-02-06T05:17:58","date_gmt":"2024-02-06T05:17:58","guid":{"rendered":"https:\/\/essays.homeworkacetutors.com\/2024\/02\/techinical-report-essay\/"},"modified":"2024-02-06T05:17:58","modified_gmt":"2024-02-06T05:17:58","slug":"techinical-report-essay","status":"publish","type":"post","link":"https:\/\/www.colapapers.com\/us\/techinical-report-essay\/","title":{"rendered":"Techinical Report Essay"},"content":{"rendered":"<article class=\"essay-content\">\n<p>Faculty of Computing and Information Technology<\/p>\n<p>Diploma in Science (Internet Technology) Year 2<\/p>\n<h3>Academic Year 2018\/2019<\/h3>\n<h3>AACS3023 Web Application Programming<\/h3>\n<h3>Assignment: Web Technology Research<\/h3>\n<h2>Programme : DIT2<\/h2>\n<h2>Tutorial Group : A3<\/h2>\n<p>Student Name : Michelle Yang Tzy Wen17JMD01953<\/p>\n<h3>Supervisor : Ms. Leong Pui Huang<\/h3>\n<p>Date Submitted to Tutor : Date\/Time Received : [ ] On time \/ [ ] Late<\/p>\n<h2>Remarks<\/h2>\n<p>(If any) : Signature : Declaration<\/p>\n<p>We confirm that we have read and shall comply with all the terms and conditions of TAR University College\u0092s plagiarism policy.<\/p>\n<p>We declare that this assignment is free from all forms of plagiarism and for all intents and purposes is my own properly derived work.<\/p>\n<div class=\"in-text-block-1\"><\/div>\n<\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014<\/p>\n<p>(Name)<\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014<\/p>\n<p>(Signature)<\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014<\/p>\n<p>(Date)<\/p>\n<h2>Marking Rubrics<\/h2>\n<p>Programme: DIT2 Student Name: Michelle Yang Tzy Wen<\/p>\n<p>Tutorial Class: A3 Student ID No.: 17JMD01953<\/p>\n<p>CRITERIA TOTAL MARK POOR AVERAGE GOOD EXCELLENCE MARK<\/p>\n<h3>Quality of research topic 2 0 mark<\/h3>\n<p>The topic is not clearly defined. 1 mark<\/p>\n<p>The topic is focused but lacks direction. 2 marks<\/p>\n<p>The topic is focused narrowly enough for the scope of this assignment. Report Format<\/p>\n<p>2 0 mark<\/p>\n<p>No TOC, page number, header and sub header.<\/p>\n<div class=\"in-text-block-2\"><\/div>\n<p> Inconsistent format. 1 mark<\/p>\n<p>TOC, page number, header and sub header are given. Majority of the contents are formatted consistently. 2 marks<\/p>\n<p>TOC, page number, header and sub header are given. Formally presented with consistent format and easy-to-follow structure. Spelling and Grammar<\/p>\n<p>2<\/p>\n<p>0 mark<\/p>\n<p>Contains numerous grammatical and spelling errors.<\/p>\n<p>1 mark<\/p>\n<p>Contains few grammatical and spelling errors.<\/p>\n<p>2 marks<\/p>\n<p>Rules of grammar are followed. Spelling is correct. Diagrams and Figures 2<\/p>\n<p>0 mark<\/p>\n<h3>No diagrams and figures used.<\/h3>\n<p>1 mark<\/p>\n<p>Contains few diagrams and figures used. 2 marks<\/p>\n<p>Appropriate diagrams and figures used. In-text citations and end references 2<\/p>\n<p>0 mark<\/p>\n<h3>No cited works used. 1 mark<\/h3>\n<p>Some cited works are done in the correct format. In consistencies evident. 2 marks<\/p>\n<p>All cited works are done in the correct format with no errors. Report Content 10<\/p>\n<p>0 \u0096 2 marks<\/p>\n<p>Required details are not given. Contents are poorly elaborated. 3 \u0096 5 marks<\/p>\n<p>Required details are given. Contents are elaborated well. 6 \u0096 7 marks<\/p>\n<p>Required details are given. Contents are elaborated in detailed. 8 \u0096 10 marks<\/p>\n<p>Detailed descriptions are given. Good elaborations. All essential details are given. Total<\/p>\n<p>20%<\/p>\n<h3>Turnitin Report (1st page only)<\/h3>\n<p>Web Technology Research Topic: Movie Ticket System (Security Module)<\/p>\n<h2>Existing Problems<\/h2>\n<p>Even though the movie ticket system has security, but it does not mean that your account will be safe. It is due to some of the hackers are able to manage to hack your account to steal your identities especially your bank account. It is a serious problem that we faced. In order to protect the customers\u0092 accounts, our system do have a software called password encryption. Unfortunately, the hackers are able to decrypt the passwords. It is not an easy task to decrypt the passwords, unless they are a skilful hacker. It will lead some of the customers feel unsafe to enter their bank account numbers.<\/p>\n<p>Figure 1: It shows the hacker hack the system<\/p>\n<p>Another problem that we faced is the checkbox remember me. It is convenience and save time for users because they do not need to type their usernames and passwords whenever they log in. However it is insecure because if user\u0092s laptop or any devices are stolen by the thief, they can just log in and know user\u0092s identities.<\/p>\n<p>Figure 2: It shows the remember me checkbox<\/p>\n<h3>Alternative Techniques<\/h3>\n<p>In order to overcome the existing problems that we faced, we used captcha to solve the problems. Captcha is the short form of Completely Automated Public Turing test to tell Computers and Human Apart. It is a software that provide a security for us. It helps us to determine whether we are a human or a bot when we do the registration and others. It shows users a series of disfigure words and users need to figure out and type it in a textbox below the disfigure words box.<\/p>\n<p>The reason why we install this captcha is because we want to prevent bots or spammers to create any problems to customers. Especially when users create a new account. It also protect the users\u0092 account from hacking. Most of the hackers are create a bot and hack the accounts or change the users\u0092 passwords to let the users cannot log in to their accounts. Some of the hackers will keep on spamming the useless comments to users. Hence, captcha will block all of the comments and it only allow human can comment. It is easy to implement in the website because the software developer just need to type the coding in the program within few hours.<\/p>\n<p>There are some few issues that we faced when we are using captcha. We cannot prevent all the spams all the time. Some of the hackers are still able to break the system and the bots are still able to spam. Present days, not all the bots are unable to read the disfigure words. The hackers may create a new bots which they can read the words and hack users\u0092 accounts. Not all the users can read the disfigure words so they are difficult to figure out what are those words and it will lead to time-consuming. Some of the users may find it very annoying because whenever they change the info during registration, they need to type the captcha again and again.<\/p>\n<h3>Figure 3: Example of captcha<\/h3>\n<h2>Proposed Technique<\/h2>\n<p>Due to the captcha cannot solve all the problems, now we implement re-captcha to replace the captcha. It has the same function as captcha is to protect the website from spammers or bots and prevent the hackers from hacking users\u0092 accounts. It also distinguish whether you are a human or bots. The different between these captcha and re-captcha is that re-captcha ask the users to choose the pictures. For example, it show 9 different pictures but 3 of them are bicycle. It want the users to select the bicycle only. Therefore, users need to choose the pictures which are the bicycle. This method is secure compared to captcha. It is because the hackers create a bot which can read the words. Bots do not know how to figure out the pictures, it is because every users will get the different questions and pictures. Users are easy to know the pictures rather than disfigured words. It is hard for them to crack it. It will lead the customers feel safe to enter their details.<\/p>\n<h3>Figure 4: Example of re-captcha<\/h3>\n<p>Figure 5: Let the users to choose the pictures that must match with the tittle requirement.<\/p>\n<h2>Implementation<\/h2>\n<p>Step 1: Install \u0093Install-Package reCAPTCHA.MVC\u0094<\/p>\n<p>Step 2: Add the public and private key in appSettings<\/p>\n<h3>Step 3: Modify the form<\/h3>\n<p>Step 4: Implement the Controller Action<\/p>\n<h3>Strengths and Weaknesses<\/h3>\n<p>Re-captcha is not easy to get spam compare to captcha because bots do not know which pictures to select and also do not know what kind of images are inside each box. Bots are created by human means that they are rigid. This will make the hackers hard to hack users\u0092 account. The hackers are not easy to crack the re-captcha because it keep on evolve the functions. Now they evolve until version 3. If the hackers are able to crack it, which mean that they are a skilful and expert hackers. Up to now no one can crack it. By now, re-captcha is the safest security in website. Most of the users trust re-captcha rather than captcha. It easy to figure out whether you are a bot or not. If we still using captcha but still able to figure out the words and enter it by itself.<\/p>\n<p>Someday, people will able to crack re-captcha because regardless how good you create a software, it will have a weakness. It is just that see when the hackers will figure it out. Sometime users may find it annoying because when they choose the correct pictures but it still want them to do the second times but it is not the same question and pictures.<\/p>\n<h2>Future Improvements<\/h2>\n<p>We can use biometric in the future. For example, when users want to log in their account through phone, they can use finger print to log in. It is due to every person has different finger print. Therefore they do not need to type their username and password. If they use laptop to log in, it can scan their face shape or eye to scan through the camera.<\/p>\n<p>We can send code to the users and they need to enter within 1 minute. If 1 minute is over, the code will be expired and they need to resend it again. The code can either send it through their phone or their email. It is to make sure that it is the user who log in to their account. If unauthorized people want to log in your account, the users will know about it because the code will send it to users\u0092 phone or email.<\/p>\n<h2>References<\/h2>\n<p>Jardine, J. (2018).\u00a0Remember Me Features. [online] Developsec.com. Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>Help.justgiving.com. (2018). [online] Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>SearchSecurity. (2018).\u00a0What is the purpose of CAPTCHA technology?. [online] Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>Humanity, P. (2018).\u00a0The Pros and Cons of CAPTCHAs \u00ab Phil for Humanity. [online] Philforhumanity.com. Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>TechVoi. (2018).\u00a04 Benefits of Captcha that Make it a Must-Have for Every Website. [online] Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>Lifewire.com. (2018). [online] Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>Sophosnews.files.wordpress.com. (2018). [online] Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>Bitbay.net. (2018). [online] Available at: [Accessed 23 Nov. 2018].<\/p>\n<p>[closed], H. (2018).\u00a0How to implement reCaptcha for ASP.NET MVC?. [online] Stack Overflow. Available at: [Accessed 23 Nov. 2018].<\/p>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>Faculty of Computing and Information Technology Diploma in Science (Internet Technology) Year 2 Academic Year 2018\/2019 AACS3023 Web Application Programming Assignment: Web Technology Research Programme : DIT2 Tutorial Group : A3 Student Name : Michelle Yang Tzy Wen17JMD01953 Supervisor : Ms. Leong Pui Huang Date Submitted to Tutor : Date\/Time Received : [ ] On [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6495,8577,5964,8396],"tags":[6964,6963,5853,6862,6965],"class_list":["post-52052","post","type-post","status-publish","format-standard","hentry","category-do-my-assignment","category-essay-writing-help","category-free-essay","category-paper-writing-service","tag-affordable-assignment-assistance","tag-custom-essay-writing","tag-free-essay-samples","tag-online-homework-help","tag-professional-homework-tutors"],"_links":{"self":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/posts\/52052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/comments?post=52052"}],"version-history":[{"count":0,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/posts\/52052\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/media?parent=52052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/categories?post=52052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/tags?post=52052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}